s geographic and functional combatant commanders, with dhs, fbi and other agencies in government. we need to see an attack coming in order to defend against that attack. we are looking at ways to strengthen cipher command as well. we must ensure that it has the resources, the authority, the capability required to perform this mission. it must also be able to react quickly to events unfolding in cyberspace and fully integrate cyber into all of the department also plans and activities. finally, the third area is to build stronger partnership. as i have made clear, securing cyberspace is not the sole response ability of the united states military or even the sole responsibility of the united states government. the private-sector, government, military, our allies all share the same local infrastructure. we all share a deep responsibility to protect it. we are deepening cooperation with our closest allies with the goal of sharing that information, that a mighty cheer capabilities, and determining malicious activities -- maximizing sheered capabilities and determining militias activitie